Army of Fake Social Media Friends to Promote Propaganda

Posted: February 28, 2011 in Uncategorized

All,

My use of social media is quite limited, and this is one reason why.

Unfortunately, however, abuse of social media by government is not under my control or even the control of the site owners.  Simply not using social media extensively does not protect me from being the subject of a smear campaign being conducted ABOUT me, or anyone else,  by “friends” of “friends.”

This article explains why.

And so this abuse of government power is clearly another manifestation of the metastasizing fascism – the growing imposition of government’s authority over you, not your authority over government – that is overwhelming the social climate in the U.S. and leading to an acceptance of authoritarian government.

Scott

====

Army of Fake Social Media Friends to Promote Propaganda

http://www.pcworld.com/article/220495/army_of_fake_social_media_friends_to_promote_propaganda.html

Does a code of ethics still exist in Intelligence firms? Does it disappear behind closed doors, dirty deeds done in the dark and used against the American people who are supposed to be free to express themselves?

By Darlene Storm, Computerworld    Feb 23, 2011 4:03 pm

It’s recently been revealed that the U.S. government contracted HBGary Federal for the development of software which could create multiple fake social media profiles to manipulate and sway public opinion on controversial issues by promoting propaganda. It could also be used as surveillance to find public opinions with points of view the powers-that-be didn’t like. It could then potentially have their “fake” people run smear campaigns against those “real” people. As disturbing as this is, it’s not really new for U.S. intelligence or private intelligence firms to do the dirty work behind closed doors.

EFF previously warned that Big Brother wants to be your friend for social media surveillance. While the FBI Intelligence Information Report Handbook (PDF) mentioned using “covert accounts” to access protected information, other government agencies endorsed using security exploits to access protected information.

It’s not a big surprise that the U.S. military also wants to use social media to its benefit. Last year, Public Intelligence published the U.S. Air Force social media guide which gave 10 tips for social media such as, “The enemy is engaged in this battlespace and you must engage there as well.” Number three was “DON’T LIE. Credibility is critical, without it, no one cares what you have to say…it’s also punishable by the UCMJ to give a false statement.”

Advertisements

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s